Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices

The heterogeneous nature of the Internet of Things (IoT) requires sophisticated and distributed security schemes for providing reliable communication. However, providing a unanimous security measure is a tedious task for heterogeneous devices is a complex task. This function requires multiple commun...

Full description

Saved in:
Bibliographic Details
Published inSoft computing (Berlin, Germany) Vol. 25; no. 18; pp. 12131 - 12144
Main Author Al-Otaibi, Yasser D.
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin Heidelberg 01.09.2021
Subjects
Online AccessGet full text
ISSN1432-7643
1433-7479
DOI10.1007/s00500-021-05864-5

Cover

Abstract The heterogeneous nature of the Internet of Things (IoT) requires sophisticated and distributed security schemes for providing reliable communication. However, providing a unanimous security measure is a tedious task for heterogeneous devices is a complex task. This function requires multiple communication and information sharing constraints to be adapted by connected users. In this article, a distributed multi-party security computation framework for ensuring the security level of scalable information sharing and communications in heterogeneous IoT. This computation framework uses synchronized security measures through recurrent verification on different communicating ends of the devices. In this verification process, backpropagation learning verifies end-to-end security and the communication session between the connected devices. MPC is generally subject to a significant overhead for correspondence but has the benefit of being confidential even if pursued until a substantial percentage of the participants are aggressive and coordinated. Secret MPC exchanging will protect the specifications of both models and the training/inference information. The multi-party verification relies on both device and service providers for unanimously synchronizing the different security computations in a less complex manner. This framework is reliable in mitigating man-in-middle and information loss adversaries. The performance of the proposed method is verified using the metrics detection ratio, response rate, delay, and overhead.
AbstractList The heterogeneous nature of the Internet of Things (IoT) requires sophisticated and distributed security schemes for providing reliable communication. However, providing a unanimous security measure is a tedious task for heterogeneous devices is a complex task. This function requires multiple communication and information sharing constraints to be adapted by connected users. In this article, a distributed multi-party security computation framework for ensuring the security level of scalable information sharing and communications in heterogeneous IoT. This computation framework uses synchronized security measures through recurrent verification on different communicating ends of the devices. In this verification process, backpropagation learning verifies end-to-end security and the communication session between the connected devices. MPC is generally subject to a significant overhead for correspondence but has the benefit of being confidential even if pursued until a substantial percentage of the participants are aggressive and coordinated. Secret MPC exchanging will protect the specifications of both models and the training/inference information. The multi-party verification relies on both device and service providers for unanimously synchronizing the different security computations in a less complex manner. This framework is reliable in mitigating man-in-middle and information loss adversaries. The performance of the proposed method is verified using the metrics detection ratio, response rate, delay, and overhead.
Author Al-Otaibi, Yasser D.
Author_xml – sequence: 1
  givenname: Yasser D.
  orcidid: 0000-0002-1464-8401
  surname: Al-Otaibi
  fullname: Al-Otaibi, Yasser D.
  email: yalotaibi@kau.edu.sa
  organization: Department of Information Systems, Faculty of Computing and Information Technology in Rabigh, King AbdulazizUniversity
BookMark eNp9kD1PwzAQhi1UJNrCH2DyCIPBX4mTEZWvSpVYyhwlzrl1aezKdkD994SGiYHp3pPuudM9MzRx3gFC14zeMUrVfaQ0o5RQzgjNilyS7AxNmRSCKKnKySlzonIpLtAsxh0dJlUmpsg-2piCbfoELe76fbLkUId0xBF0H-wQtO8OfaqT9Q6bUHfw5cMHNj7gLSQIfgMOfB-xdUPnIGFvcNpat4n4ZunXt7iFT6shXqJzU-8jXP3WOXp_flovXsnq7WW5eFgRzUuWiBZNAbqlNM9pJltRFrxtDHDJDFdNTnPZykblSjEmeKlr2TasNlTmwI0yvBVzxMe9OvgYA5jqEGxXh2PFaPUjqxplVYOC6iSrygao-ANpO_6cQm33_6NiRONwx20gVDvfBze8-B_1DV4Egwg
CitedBy_id crossref_primary_10_1109_TSC_2024_3376247
crossref_primary_10_3390_electronics12051136
crossref_primary_10_1155_2022_8626882
crossref_primary_10_1109_TDSC_2024_3381959
Cites_doi 10.1016/j.adhoc.2018.09.007
10.1016/j.future.2019.04.019
10.1109/ACCESS.2019.2936123
10.1007/s11042-017-5548-2
10.1109/ACCESS.2019.2958089
10.1109/ACCESS.2019.2961413
10.1049/trit.2018.1008
10.1016/j.jnca.2020.102633
10.1007/s11227-018-2686-x
10.1007/s40860-018-0062-5
10.1007/s42979-020-00201-3
10.1109/ACCESS.2020.2964038
10.1016/j.adhoc.2020.102253
10.1109/JIOT.2018.2890728
10.1016/j.jnca.2019.102496
10.1109/TSG.2017.2720159
10.1007/s12243-018-00702-6
10.1109/ACCESS.2019.2901375
10.1016/j.simpat.2020.102125
10.1007/s11227-016-1684-0
10.1007/s00607-018-0639-0
10.1109/ACCESS.2018.2847632
10.1016/j.iot.2020.100240
10.1109/ACCESS.2019.2913438
10.1016/j.cose.2018.06.004
10.1016/j.scs.2019.101522
10.1109/ACCESS.2020.2996264
10.1109/JIOT.2020.2964015
10.1007/s10207-019-00484-5
10.4018/978-1-5225-2947-7.ch011
10.1007/s11036-019-01490-6
10.1007/s12652-018-1154-z
10.1007/s10586-019-03036-7
10.1002/ett.3815
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021
Copyright_xml – notice: The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021
DBID AAYXX
CITATION
DOI 10.1007/s00500-021-05864-5
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1433-7479
EndPage 12144
ExternalDocumentID 10_1007_s00500_021_05864_5
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.86
.VR
06D
0R~
0VY
1N0
1SB
203
29~
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K7-
KDC
KOV
LAS
LLZTM
M4Y
MA-
N2Q
NB0
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
P2P
P9P
PF0
PT4
PT5
QOS
R89
R9I
RIG
RNI
ROL
RPX
RSV
RZK
S16
S1Z
S27
S3B
SAP
SDH
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z5O
Z7R
Z7X
Z7Y
Z7Z
Z81
Z83
Z88
ZMTXR
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PUEGO
ID FETCH-LOGICAL-c291t-c3b8ecd0066054d3982dbfe241f27b6064d4b767711329ca4db1af046e2f7f2d3
IEDL.DBID AGYKE
ISSN 1432-7643
IngestDate Thu Apr 24 23:06:22 EDT 2025
Wed Oct 01 03:00:14 EDT 2025
Fri Feb 21 02:47:58 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 18
Keywords Multi-party security
Synchronized authentication
Secure computation
Machine learning
IoT
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-c3b8ecd0066054d3982dbfe241f27b6064d4b767711329ca4db1af046e2f7f2d3
ORCID 0000-0002-1464-8401
PageCount 14
ParticipantIDs crossref_primary_10_1007_s00500_021_05864_5
crossref_citationtrail_10_1007_s00500_021_05864_5
springer_journals_10_1007_s00500_021_05864_5
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20210900
2021-09-00
PublicationDateYYYYMMDD 2021-09-01
PublicationDate_xml – month: 9
  year: 2021
  text: 20210900
PublicationDecade 2020
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
PublicationSubtitle A Fusion of Foundations, Methodologies and Applications
PublicationTitle Soft computing (Berlin, Germany)
PublicationTitleAbbrev Soft Comput
PublicationYear 2021
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
References Jegadeesan, Azees, Kumar, Manogaran, Chilamkurti, Varatharajan, Hsu (CR40) 2019; 49
Choi, In, Park, Seok, Seo, Kim (CR5) 2016; 74
Ghosh, Chakraborty, Law (CR8) 2018; 3
Wang, Bai, Lei, Zhao, Yang, Han (CR30) 2019; 7
Riad, Huang, Ke (CR24) 2020; 160
CR17
Zhou, Wang, Sun, Lv (CR39) 2018; 6
CR15
Qiu, Fan, Zhang, Pan, Li, Yang (CR23) 2019; 7
Dhillon, Kalra (CR7) 2018; 4
Li, Zhu, Xiong, Mo, Ying, Wang (CR14) 2019; 74
Yuan, Yuan, Li, Wang (CR35) 2019; 6
Ayoade, El-Ghamry, Karande, Khan, Alrahmawy, Rashad (CR2) 2018; 75
Wazid, Das, Bhat, Vasilakos (CR32) 2020; 150
He, Kumar, Zeadally, Vinel, Yang (CR11) 2017; 8
Ostad-Sharif, Arshad, Nikooghadam, Abbasinezhad-Mood (CR18) 2019; 100
Bu, Isakov, Kinsy (CR4) 2019; 92
Jurcut, Niculcea, Ranaweera, Le-Khac (CR12) 2020; 1
Zhang, Yu, Tian, Xu, Gao, Lin (CR38) 2020; 7
Santos, Carneiro, Franco, Teixeira, Henriques, Oliveira (CR27) 2020; 107
Liu, Wang, Zhang (CR16) 2020; 8
Preeth, Dhanalakshmi, Shakeel (CR21) 2019; 13
Sheron, Sridhar, Baskar, Shakeel (CR28) 2020; 31
CR29
Rizvi, Pipetti, Mcintyre, Todd, Williams (CR25) 2020; 11
Lee, Kang, Ryu, Won, Kim, Lee (CR13) 2020; 52
Bae, Kwak (CR3) 2020; 79
Hammi, Hammi, Bellot, Serhrouchni (CR10) 2018; 78
CR22
CR20
Zhang, Ren, Wu, Zhang, Cao, Zheng (CR37) 2019; 7
Salimi, Mala, Martin, Peris-Lopez (CR26) 2020; 8
Xi (CR33) 2019; 7
Wang, An, Chang (CR31) 2020; 8
Pešić, Ivanović, Radovanović, Bădică (CR19) 2020; 105
Zhang, Durresi, Durresi (CR36) 2018; 101
H Lee (5864_CR13) 2020; 52
5864_CR29
A Jurcut (5864_CR12) 2020; 1
M Salimi (5864_CR26) 2020; 8
L Wang (5864_CR31) 2020; 8
PF Sheron (5864_CR28) 2020; 31
J Choi (5864_CR5) 2016; 74
SSL Preeth (5864_CR21) 2019; 13
M Wazid (5864_CR32) 2020; 150
D Wang (5864_CR30) 2019; 7
PK Dhillon (5864_CR7) 2018; 4
D He (5864_CR11) 2017; 8
5864_CR20
K Riad (5864_CR24) 2020; 160
ML Santos (5864_CR27) 2020; 107
5864_CR22
P Zhang (5864_CR36) 2018; 101
Y Zhang (5864_CR37) 2019; 7
5864_CR17
A Ostad-Sharif (5864_CR18) 2019; 100
5864_CR15
WI Bae (5864_CR3) 2020; 79
S Jegadeesan (5864_CR40) 2019; 49
Q Li (5864_CR14) 2019; 74
S Pešić (5864_CR19) 2020; 105
J Qiu (5864_CR23) 2019; 7
X Yuan (5864_CR35) 2019; 6
A Ghosh (5864_CR8) 2018; 3
S Rizvi (5864_CR25) 2020; 11
L Bu (5864_CR4) 2019; 92
L Zhou (5864_CR39) 2018; 6
H Zhang (5864_CR38) 2020; 7
G Ayoade (5864_CR2) 2018; 75
MT Hammi (5864_CR10) 2018; 78
L Liu (5864_CR16) 2020; 8
Z Xi (5864_CR33) 2019; 7
References_xml – ident: CR22
– volume: 92
  start-page: 101762
  year: 2019
  ident: CR4
  article-title: A secure and robust scheme for sharing confidential information in IoT systems
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2018.09.007
– volume: 100
  start-page: 882
  year: 2019
  end-page: 892
  ident: CR18
  article-title: Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme
  publication-title: Futur Gener Comput Syst
  doi: 10.1016/j.future.2019.04.019
– volume: 7
  start-page: 114721
  year: 2019
  end-page: 114730
  ident: CR37
  article-title: Certificateless multi-party authenticated encryption for NB-IoT terminals in 5G networks
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2936123
– volume: 79
  start-page: 15793
  issue: 23
  year: 2020
  end-page: 15811
  ident: CR3
  article-title: Smart card-based secure authentication protocol in multi-server IoT environment
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-017-5548-2
– volume: 7
  start-page: 180205
  year: 2019
  end-page: 180217
  ident: CR23
  article-title: An efficient multi-message and multi-receiver signcryption scheme for heterogeneous smart mobile IoT
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2958089
– volume: 8
  start-page: 95057
  year: 2020
  end-page: 95067
  ident: CR16
  article-title: Secure IoT data outsourcing with aggregate statistics and fine-grained access control
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2961413
– volume: 13
  start-page: 1
  year: 2019
  end-page: 12
  ident: CR21
  article-title: An intelligent approach for energy efficient trajectory design for mobile sink based IoT supported wireless sensor networks
  publication-title: Peer-to-Peer Netw Appl
– volume: 3
  start-page: 208
  issue: 4
  year: 2018
  end-page: 218
  ident: CR8
  article-title: Artificial intelligence in Internet of things
  publication-title: CAAI Trans Intell Technol
  doi: 10.1049/trit.2018.1008
– volume: 160
  start-page: 102633
  year: 2020
  ident: CR24
  article-title: A dynamic and hierarchical access control for IoT in multi-authority cloud storage
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2020.102633
– volume: 75
  start-page: 4684
  issue: 8
  year: 2018
  end-page: 4709
  ident: CR2
  article-title: Secure data processing for IoT middleware systems
  publication-title: J Supercomput
  doi: 10.1007/s11227-018-2686-x
– volume: 4
  start-page: 141
  issue: 3
  year: 2018
  end-page: 160
  ident: CR7
  article-title: Multi-factor user authentication scheme for IoT-based healthcare services
  publication-title: J Reliable Intell Environ
  doi: 10.1007/s40860-018-0062-5
– volume: 1
  start-page: 1
  issue: 4
  year: 2020
  end-page: 19
  ident: CR12
  article-title: Security considerations for internet of things: a survey
  publication-title: SN Comput Sci
  doi: 10.1007/s42979-020-00201-3
– volume: 8
  start-page: 8821
  year: 2020
  end-page: 8833
  ident: CR26
  article-title: Full-resilient memory-optimum multi-party non-interactive key exchange
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2964038
– volume: 107
  start-page: 102253
  year: 2020
  ident: CR27
  article-title: FLAT: federated lightweight authentication for the Internet of Things
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2020.102253
– volume: 6
  start-page: 3753
  issue: 2
  year: 2019
  end-page: 3763
  ident: CR35
  article-title: Toward secure and scalable computation in internet of things data applications
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2018.2890728
– ident: CR29
– volume: 150
  start-page: 102496
  year: 2020
  ident: CR32
  article-title: LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2019.102496
– volume: 8
  start-page: 2411
  issue: 5
  year: 2017
  end-page: 2419
  ident: CR11
  article-title: Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversariesm"
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2017.2720159
– volume: 31
  start-page: e3815
  issue: 12
  year: 2020
  ident: CR28
  article-title: A decentralized scalable security framework for end-to-end authentication of future IoT communication
  publication-title: Trans Emerg Telecommun Technol
– volume: 74
  start-page: 389
  issue: 7–8
  year: 2019
  end-page: 400
  ident: CR14
  article-title: Fine-grained multi-authority access control in IoT-enabled mHealth
  publication-title: Ann Telecommun
  doi: 10.1007/s12243-018-00702-6
– volume: 7
  start-page: 56606
  year: 2019
  end-page: 56616
  ident: CR33
  article-title: Research on underwater wireless sensor network and MAC protocol and location algorithm
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2901375
– volume: 105
  start-page: 102125
  year: 2020
  ident: CR19
  article-title: CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
  publication-title: Simul Model Pract Theory
  doi: 10.1016/j.simpat.2020.102125
– volume: 74
  start-page: 3521
  issue: 8
  year: 2016
  end-page: 3535
  ident: CR5
  article-title: Secure IoT framework and 2D architecture for End-To-End security
  publication-title: J Supercomput
  doi: 10.1007/s11227-016-1684-0
– volume: 101
  start-page: 729
  issue: 7
  year: 2018
  end-page: 742
  ident: CR36
  article-title: Multi-access edge computing aided mobility for privacy protection in internet of things
  publication-title: Computing
  doi: 10.1007/s00607-018-0639-0
– volume: 6
  start-page: 43472
  year: 2018
  end-page: 43488
  ident: CR39
  article-title: BeeKeeper: A blockchain-based IoT system with secure storage and homomorphic computation
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2847632
– volume: 11
  start-page: 100240
  year: 2020
  ident: CR25
  article-title: Threat model for securing internet of things (IoT) network at device-level
  publication-title: Internet of Things
  doi: 10.1016/j.iot.2020.100240
– volume: 7
  start-page: 54508
  year: 2019
  end-page: 54521
  ident: CR30
  article-title: Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2913438
– ident: CR15
– ident: CR17
– volume: 78
  start-page: 126
  year: 2018
  end-page: 142
  ident: CR10
  article-title: Bubbles of trust: a decentralized blockchain-based authentication system for IoT
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2018.06.004
– volume: 49
  start-page: 101522
  year: 2019
  ident: CR40
  article-title: An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications
  publication-title: Sustain Cities Soc
  doi: 10.1016/j.scs.2019.101522
– volume: 8
  start-page: 97267
  year: 2020
  end-page: 97278
  ident: CR31
  article-title: Security enhancement on a lightweight authentication scheme with anonymity fog computing architecture
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2996264
– volume: 52
  start-page: 102494
  year: 2020
  ident: CR13
  article-title: A three-factor anonymous user authentication scheme for Internet of Things environments
  publication-title: J Inf Secur Appl
– ident: CR20
– volume: 7
  start-page: 2968
  issue: 4
  year: 2020
  end-page: 2981
  ident: CR38
  article-title: Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2020.2964015
– volume: 13
  start-page: 1
  year: 2019
  ident: 5864_CR21
  publication-title: Peer-to-Peer Netw Appl
– volume: 52
  start-page: 102494
  year: 2020
  ident: 5864_CR13
  publication-title: J Inf Secur Appl
– volume: 74
  start-page: 3521
  issue: 8
  year: 2016
  ident: 5864_CR5
  publication-title: J Supercomput
  doi: 10.1007/s11227-016-1684-0
– volume: 7
  start-page: 114721
  year: 2019
  ident: 5864_CR37
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2936123
– volume: 3
  start-page: 208
  issue: 4
  year: 2018
  ident: 5864_CR8
  publication-title: CAAI Trans Intell Technol
  doi: 10.1049/trit.2018.1008
– volume: 11
  start-page: 100240
  year: 2020
  ident: 5864_CR25
  publication-title: Internet of Things
  doi: 10.1016/j.iot.2020.100240
– volume: 8
  start-page: 97267
  year: 2020
  ident: 5864_CR31
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2996264
– volume: 8
  start-page: 2411
  issue: 5
  year: 2017
  ident: 5864_CR11
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2017.2720159
– volume: 7
  start-page: 56606
  year: 2019
  ident: 5864_CR33
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2901375
– ident: 5864_CR17
  doi: 10.1007/s10207-019-00484-5
– volume: 78
  start-page: 126
  year: 2018
  ident: 5864_CR10
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2018.06.004
– volume: 49
  start-page: 101522
  year: 2019
  ident: 5864_CR40
  publication-title: Sustain Cities Soc
  doi: 10.1016/j.scs.2019.101522
– volume: 6
  start-page: 43472
  year: 2018
  ident: 5864_CR39
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2847632
– volume: 7
  start-page: 2968
  issue: 4
  year: 2020
  ident: 5864_CR38
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2020.2964015
– volume: 100
  start-page: 882
  year: 2019
  ident: 5864_CR18
  publication-title: Futur Gener Comput Syst
  doi: 10.1016/j.future.2019.04.019
– volume: 107
  start-page: 102253
  year: 2020
  ident: 5864_CR27
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2020.102253
– ident: 5864_CR29
  doi: 10.4018/978-1-5225-2947-7.ch011
– ident: 5864_CR15
  doi: 10.1007/s11036-019-01490-6
– ident: 5864_CR20
  doi: 10.1007/s12652-018-1154-z
– volume: 160
  start-page: 102633
  year: 2020
  ident: 5864_CR24
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2020.102633
– volume: 6
  start-page: 3753
  issue: 2
  year: 2019
  ident: 5864_CR35
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2018.2890728
– volume: 7
  start-page: 54508
  year: 2019
  ident: 5864_CR30
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2913438
– volume: 8
  start-page: 8821
  year: 2020
  ident: 5864_CR26
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2964038
– volume: 92
  start-page: 101762
  year: 2019
  ident: 5864_CR4
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2018.09.007
– ident: 5864_CR22
  doi: 10.1007/s10586-019-03036-7
– volume: 1
  start-page: 1
  issue: 4
  year: 2020
  ident: 5864_CR12
  publication-title: SN Comput Sci
  doi: 10.1007/s42979-020-00201-3
– volume: 7
  start-page: 180205
  year: 2019
  ident: 5864_CR23
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2958089
– volume: 4
  start-page: 141
  issue: 3
  year: 2018
  ident: 5864_CR7
  publication-title: J Reliable Intell Environ
  doi: 10.1007/s40860-018-0062-5
– volume: 79
  start-page: 15793
  issue: 23
  year: 2020
  ident: 5864_CR3
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-017-5548-2
– volume: 74
  start-page: 389
  issue: 7–8
  year: 2019
  ident: 5864_CR14
  publication-title: Ann Telecommun
  doi: 10.1007/s12243-018-00702-6
– volume: 150
  start-page: 102496
  year: 2020
  ident: 5864_CR32
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2019.102496
– volume: 75
  start-page: 4684
  issue: 8
  year: 2018
  ident: 5864_CR2
  publication-title: J Supercomput
  doi: 10.1007/s11227-018-2686-x
– volume: 101
  start-page: 729
  issue: 7
  year: 2018
  ident: 5864_CR36
  publication-title: Computing
  doi: 10.1007/s00607-018-0639-0
– volume: 105
  start-page: 102125
  year: 2020
  ident: 5864_CR19
  publication-title: Simul Model Pract Theory
  doi: 10.1016/j.simpat.2020.102125
– volume: 8
  start-page: 95057
  year: 2020
  ident: 5864_CR16
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2961413
– volume: 31
  start-page: e3815
  issue: 12
  year: 2020
  ident: 5864_CR28
  publication-title: Trans Emerg Telecommun Technol
  doi: 10.1002/ett.3815
SSID ssj0021753
Score 2.3139787
Snippet The heterogeneous nature of the Internet of Things (IoT) requires sophisticated and distributed security schemes for providing reliable communication. However,...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 12131
SubjectTerms Artificial Intelligence
Computational Intelligence
Control
Engineering
Focus
Mathematical Logic and Foundations
Mechatronics
Robotics
Title Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices
URI https://link.springer.com/article/10.1007/s00500-021-05864-5
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1433-7479
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0021753
  issn: 1432-7643
  databaseCode: AFBBN
  dateStart: 19970401
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1433-7479
  dateEnd: 20241105
  omitProxy: true
  ssIdentifier: ssj0021753
  issn: 1432-7643
  databaseCode: BENPR
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1433-7479
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0021753
  issn: 1432-7643
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1433-7479
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0021753
  issn: 1432-7643
  databaseCode: U2A
  dateStart: 19970404
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED7RdoGBN6I8Kg8MIEjVOE6djuVRCohOrQRTFL9EBWoQTQf49ZxdpwKEkNgdy_Kdfd_Fd98HcMRUmFgaqqAluMQEpdUKRMKjoNNiodEMgwK3Dc73g3Z_xG4f4gffFDYtq93LJ0l3Uy-a3SxVCc5JMf2NkzYL4grUHN9WFWrd68e7q0Wi5dknEQogesSQ65tlfp_le0D6_hrqgkxvDUbl8ua1Jc_NWSGa8uMHc-N_178Oqx51ku7cTTZgSU82Ya1UdCD-gG_Cyhd6wi0YX1pWXSuIpRVxlYfBK3raO5l60Tsi3QzOuMSUZV4EcTB5smU2OXqnzmdTMnb_HXVBckMKpxRKjm_y4QlR2t1U2zDqXQ0v-oGXZggk7YRFICORaKksYEHMp6JOQpUwGuGAoVxgUsQUE7zNuROylxlTIswM5uKaGm6oinagOsknehcIM4prmknDWMY6USRYnDGm2wh8EhFJVYewtE8qPW-5lc94SReMy25nU9zZ1O1sGtfhdPHN65y148_RZ6XFUn-Cp38M3_vf8H1Yps7oti7tAKrF20wfIpApRAP9tnd-Pmh4_21AZUS7n5YT6o0
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagDMDAo4AoTw8MIIiUOE6cjBVQtdB2aqVuUfwSlVBT0XTg33N2nYhKqBK74-Hu7Psuvvs-hO6oDBJDQ-X5nAkoUHzf4wkLvdSngVYUkgIzA86DYdwd07dJNHFDYYuq2716krQ3dT3sZqhKYE8C5W-UxNSLttGOIbAyjPlj0q7LLMc9CUAAsCMkXDcq8_ce6-lo_S3UppjOETpw2BC3V848Rltq1kSHle4CdsewifZ_kQieoOmL4b41slVKYtsf6M0hHr7xwknTYWF3sC7AumrGwoBW8YdphikghlSxXOCp_TuoSlxoXFo9T3zfK0YPWCp7n5yiced19Nz1nICCJ0galJ4IeaKENLACkJkM04RIrhUkbU0Yh9KFSspZzJiVmxc5lTzINVTMimimiQzPUGNWzNQ5wlRLpkguNKU5TcOQ0yinVMUATxIeCtlCQWXHTDh2cSNy8ZnVvMjW9hnYPrO2z6IWeqy_ma-4NTaufqrck7lzttiw_OJ_y2_Rbnc06Gf93vD9Eu0RGyKmk-wKNcqvpboG6FHyGxtpP44yzhs
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60gujBR1Wszz14UDQ02WyyyVGspfVRPLTQW8i-sCBJsenBf-_sNgktSMH7Zg8zszvfZGe-D6EbKr3I0FA5LmcCChTXdXjEfCd2qacVhaTAzIDz-yDsjejLOBgvTfHbbvfqSXIx02BYmrKiPZW6XQ--GdoS2J9AKRxEIXWCTbRFDVECRPSIPNYlV8lDCaAAcCQk33Js5u89VlPT6ruoTTfdA7RX4kT8uHDsIdpQWRPtVxoMuDySTbS7RCh4hCYdw4NrJKyUxLZX0JlCbPzgWSlTh4XdwboD66oxCwNyxZ-mMSaHeFL5fIYn9k-hKnCucWG1PfFtPx_eYans3XKMRt3n4VPPKcUUHEFir3CEzyMlpIEYgNKkH0dEcq0ggWvCOJQxVFLOQsas9LxIqeReqqF6VkQzTaR_ghpZnqlThKmWTJFUaEpTGvs-p0FKqQoBqkTcF7KFvMqOiSiZxo3gxVdScyRb2ydg-8TaPgla6L7-Zrrg2Vi7-qFyT1Keudma5Wf_W36Ntj863eStP3g9RzvERohpKrtAjeJ7ri4BhRT8ygbaL6fp0lc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Distributed+multi-party+security+computation+framework+for+heterogeneous+internet+of+things+%28IoT%29+devices&rft.jtitle=Soft+computing+%28Berlin%2C+Germany%29&rft.au=Al-Otaibi%2C+Yasser+D.&rft.date=2021-09-01&rft.issn=1432-7643&rft.eissn=1433-7479&rft.volume=25&rft.issue=18&rft.spage=12131&rft.epage=12144&rft_id=info:doi/10.1007%2Fs00500-021-05864-5&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s00500_021_05864_5
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1432-7643&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1432-7643&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1432-7643&client=summon